Fragile Watermarking for Image Authentication Using QR factorization and Fourier Transform

被引:0
作者
Nejati, Fatemeh [1 ]
Sajedi, Hedieh [2 ]
Mohammadi, Maryam [1 ]
机构
[1] Kharazmi Univ, Fac Math Sci & Comp, Tehran, Iran
[2] Univ Tehran, Coll Sci, Dept Math Stat & Comp Sci, Tehran, Iran
来源
2019 5TH INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR) | 2019年
关键词
Fragile Watermarking; Image authentication; QR decomposition; Fourier transform; DISCRETE WAVELET TRANSFORM;
D O I
10.1109/icwr.2019.8765292
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Image authentication technique is one of the important methods for a large number of multimedia applications. When a digital image is passed over non-secure channels such as the Internet, it may be changed and manipulated. For some important images such as military and medical images, these manipulations are very harmful and such images should be protected against them. There are several ways such as fragile and semi-fragile watermarking to authenticate images from malicious attacks. This paper presents a fragile watermarking algorithm for image authentication by using QR factorization and Fourier Transform (FT). By applying Fourier transform to host image, frequency domain which causes visual quality in watermarking is achieved. After applying FT, it is factorized by QR decomposition. QR factorization is also applied to watermark image. After factorizing both images, a coefficient of the upper triangular matrix R from watermark image is embedded to the upper triangular matrix R from host image. So a sign of the watermark image is hidden in the host image. This method is a fragile watermarking and it is sensitive to a little attack. So if an image is attacked over the Internet, the watermark image can not be extracted and it means that it has been attacked and it helps us to recognize if an image is changed after being transmitted over the Internet. The experimental results show that this method is sensitive to every weak attack and extraction part can not extract watermark image if it has been attacked.
引用
收藏
页码:45 / 49
页数:5
相关论文
共 50 条
[31]   Asymmetric Fragile Watermarking Using a Number Theoretic Transform [J].
Tamori, Hideaki ;
Yamamoto, Tsuyoshi .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (03) :836-838
[32]   Fragile watermarking for image authentication based on DWT-SVD-DCT techniques [J].
Thai-Son Nguyen .
Multimedia Tools and Applications, 2021, 80 :25107-25119
[33]   Effective Fragile Watermarking for Image Authentication with High-quality Recovery Capability [J].
Qin, Chuan ;
Chang, Chin-Chen ;
Hsu, Tai-Jung .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (11) :2941-2956
[34]   A novel Frei-Chen based fragile watermarking method for authentication of an image [J].
Renklier, Ayhan ;
Ozturk, Serkan .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (22)
[35]   A Chaos-based Fragile Watermarking Method in Spatial Domain for Image Authentication [J].
Munir, Rinaldi .
2015 INTERNATIONAL SEMINAR ON INTELLIGENT TECHNOLOGY AND ITS APPLICATIONS (ISITIA), 2015, :227-231
[36]   Biometric image integrity authentication based on SVD and fragile watermarking [J].
Wang, De-song ;
Li, Jian-ping ;
Wen, Xiao-yang .
CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 5, PROCEEDINGS, 2008, :679-682
[38]   A new time-frequency based fragile watermarking scheme for image authentication [J].
Sattar, F ;
Barkat, B .
2003 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS, AND SIGNAL PROCESSING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2003, :992-995
[39]   Semi-Fragile Watermarking for Copyright Protection and Image Authentication [J].
HUANG JifengDepartment of Computer Science and Technology Shanghai Normal University Shanghai China .
Wuhan University Journal of Natural Sciences, 2005, (01) :284-288
[40]   A Semi-Fragile Watermarking Scheme for Color Image Authentication [J].
Hassan, M. Hamad ;
Gilani, S. A. M. .
PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 13, 2006, 13 :317-321